FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-03-27 18:04:16 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
c7656d4c-cb60-11e6-a9a5-b499baebfeafphpmailer -- Remote Code Execution

Legal Hackers reports:

An independent research uncovered a critical vulnerability in PHPMailer that could potentially be used by (unauthenticated) remote attackers to achieve remote arbitrary code execution in the context of the web server user and remotely compromise the target web application.

To exploit the vulnerability an attacker could target common website components such as contact/feedback forms, registration forms, password email resets and others that send out emails with the help of a vulnerable version of the PHPMailer class.


Discovery 2016-12-26
Entry 2016-12-26
phpmailer
< 5.2.18

tt-rss
< 26.12.2016.07.29

http://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html
https://github.com/PHPMailer/PHPMailer/blob/master/SECURITY.md
CVE-2016-10033
7ae0be99-d8bb-11e6-9b7f-d43d7e971a1bphpmailer -- Remote Code Execution

SecurityFocus reports:

PHPMailer is prone to an local information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may aid in launching further attacks.


Discovery 2017-01-10
Entry 2017-01-12
phpmailer
< 5.2.22

tt-rss
< 2017.01.16

http://www.securityfocus.com/bid/95328/discuss
CVE-2017-5223
8a90dc87-89f9-11e5-a408-00248c0c745dPHPmailer -- SMTP injection vulnerability

PHPMailer changelog reports:

Fix vulnerability that allowed email addresses with line breaks (valid in RFC5322) to pass to SMTP, permitting message injection at the SMTP level. Mitigated in both the address validator and in the lower-level SMTP class. Thanks to Takeshi Terada.


Discovery 2015-11-05
Entry 2015-12-03
phpmailer
< 5.2.14

https://github.com/PHPMailer/PHPMailer/blob/v5.2.14/changelog.md
b036faba-edd8-11e8-b3b7-00e04c1ea73dphpmailer -- Multiple vulnerability

SO-AND-SO reports:

CVE-2018-19296:Fix potential object injection vulnerability.


Discovery 2018-11-16
Entry 2018-11-21
Modified 2018-11-23
phpmailer
< 5.2.27

phpmailer6
< 6.0.6

https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.27
https://github.com/PHPMailer/PHPMailer/releases/tag/v6.0.6
CVE-2018-19296
3c4693de-ccf7-11e6-a9a5-b499baebfeafphpmailer -- Remote Code Execution

Legal Hackers reports:

An independent research uncovered a critical vulnerability in PHPMailer that could potentially be used by (unauthenticated) remote attackers to achieve remote arbitrary code execution in the context of the web server user and remotely compromise the target web application.

To exploit the vulnerability an attacker could target common website components such as contact/feedback forms, registration forms, password email resets and others that send out emails with the help of a vulnerable version of the PHPMailer class.

The first patch of the vulnerability CVE-2016-10033 was incomplete. This advisory demonstrates the bypass of the patch. The bypass allows to carry out Remote Code Execution on all current versions (including 5.2.19).


Discovery 2016-12-28
Entry 2016-12-28
phpmailer
< 5.2.20

tt-rss
< 29.12.2016.04.37

https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10045-Vuln-Patch-Bypass.html
CVE-2016-10045
c5d79773-8801-11e7-93f7-d43d7e971a1bphpmailer -- XSS in code example and default exeception handler

PHPMailer reports:

Fix XSS vulnerability in one of the code examples, CVE-2017-11503. The code_generator.phps example did not filter user input prior to output. This file is distributed with a .phps extension, so it it not normally executable unless it is explicitly renamed, so it is safe by default. There was also an undisclosed potential XSS vulnerability in the default exception handler (unused by default). Patches for both issues kindly provided by Patrick Monnerat of the Fedora Project.


Discovery 2017-07-27
Entry 2017-08-23
phpmailer
< 5.2.24

https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.24
CVE-2017-11503